IT Security Governance and Centralized Security Controls

IT Security Governance and Centralized Security Controls

Merrill Warkentin (Mississippi State University, USA) and Allen C. Johnston (University of Louisiana-Monroe, USA)
DOI: 10.4018/978-1-59904-937-3.ch143
OnDemand PDF Download:
$37.50

Abstract

Every enterprise must establish and maintain information technology (IT) governance procedures that will ensure the execution of the firm’s security policies and procedures. This chapter presents the problem and the framework for ensuring that the organization’s policies are implemented over time. Since many of these policies require human involvement (employee and customer actions, for example), the goals are met only if such human activities can be influenced and monitored and if positive outcomes are rewarded while negative actions are sanctioned. This is the challenge to IT governance. One central issue in the context of IT security governance is the degree to which IT security controls should be centralized or decentralized. This issue is discussed in the context of enterprise security management.

Complete Chapter List

Search this Book:
Reset